Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:52 PM
Dark Reading
Dark Reading
Products and Releases

Sports Sites Are Top Targets In 'America's Most Wanted' List

AVAST virus lab experts offer tips to stay protected during the summer

(PRAGUE, Czech Republic, July 27, 2010) – Summer has already been heated up by some sporting events, including the World Cup, NBA Finals, LeBron James’ “Decision” and Major League Baseball. Consumers turn to the web to stay up-to-date on scores, news and other sports-related information. But, there are dangers in being a virtual spectator. AVAST Software, providers of the AVAST Antivirus program, has found a number of sports-focused infected websites in its second “America’s Most Wanted” roster of the most infected websites.

Following is a sampling from the month’s “Most Wanted” list:[1]

* cybergolf.com * elitepaintballguns.com * footballfevr.com * joinfutbol.com * mosportsmen.com * sport-pros.com * sportsroids.com * sportxsport.com * topsportzone.com * u-soccer.com

Not all infected websites are designed to spread malware – but some are. “It is difficult to characterize sites with 100 percent certainty because we see the infection but usually do not know who placed it,” said Ondrej Vlcek, Chief Technical Officer at AVAST Software. “Some are stealth sites, providing just enough content to be noticed by search engines but have the actual goal of infecting unsuspecting consumers. Other sites such as cybergolf or mosportsmen.com (Missouri Sportsmen) seem to be legitimate sites but have still gotten infected – probably unknown to their web administrators – and can spread this to visitors.”

AVAST Software receives non-stop information about infected sites thanks to its CommunityIQ global network of sensors. This data, taken from the actual web browsing experiences of an opt-in group, is then used to protect all AVAST users by blocking their access to infected sites. This flow of information responds quickly to real-time events such as the World Cup games in South Africa.

“This has been an active summer for sports fans, and hackers are taking advantage of this,” explains Mr. Vlcek. “In South Africa alone, we noticed a 200 percent increase in the number of infected web pages at the .co.za domain and successfully prevented 200,000 fans from visiting them and getting infected.

Description: avast! report - infected websites in South Africa

To help keep users – sports fans or not – protected against most infected websites, AVAST offers the following ways to steer clear of hackers and malware:

  • Go to established, reputable sites

  • Know where you click

  • Keep your browser and other applications up-to-date

  • Have an antivirus program installed that can keeps infected content from entering your computer

    About AVAST Software

    AVAST Software protects over 100 million registered users in 240 countries with its avast! antivirus programs. avast! Free Antivirus sets the standard as a free, full-featured computer security application that matches or exceeds the performance of other paid products. Anchored by the CommunityIQ network of sensors for reporting on-line threats and supported by multiple protective shields, avast! performance has been certified by VB100, ICSA Labs, and West Coast Labs. The avast! 5.0 portfolio includes Free Antivirus, Pro Antivirus for customized protection, and the premium Internet Security with its no-hassle Silent Firewall. Available in around 30 languages, avast! provides global protection that speaks your language. For more information, go to avast.com. Be free with avast!


    Briana Papa

    Crenshaw Communications

    Phone: 646-484-4573

    E-mail: [email protected]


    Lyle Frink

    AVAST Software

    Phone: 00420-274-005-787

    E-mail: [email protected]


    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Manchester United Suffers Cyberattack
    Dark Reading Staff 11/23/2020
    As 'Anywhere Work' Evolves, Security Will Be Key Challenge
    Robert Lemos, Contributing Writer,  11/23/2020
    Cloud Security Startup Lightspin Emerges From Stealth
    Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: This comment is waiting for review by our moderators.
    Current Issue
    2021 Top Enterprise IT Trends
    We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-11-28
    In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
    PUBLISHED: 2020-11-27
    blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
    PUBLISHED: 2020-11-27
    npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
    PUBLISHED: 2020-11-27
    In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
    PUBLISHED: 2020-11-27
    In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.